Severity
5.0MEDIUMNVD
OSV7.5
EPSS
24.6%
top 3.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 20
Latest updateMay 13

Description

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages5 packages

debiandebian/ntp< ntp 1:4.2.6.p5+dfsg-3.2 (bullseye)
Debianntp/ntp< 1:4.2.6.p5+dfsg-3.2
Ubuntuntp/ntp< 1:4.2.6.p5+dfsg-3ubuntu2.14.04.1
NVDntp/ntp4.2.7

🔴Vulnerability Details

3
GHSA
GHSA-9prp-4cr8-gqhf: The receive function in ntp_proto2022-05-13
OSV
ntp vulnerabilities2014-12-22
OSV
CVE-2014-9296: The receive function in ntp_proto2014-12-20

📋Vendor Advisories

13
CISA ICS
Network Time Protocol Vulnerabilities (Update C)2015-02-04
CISA ICS
Network Time Protocol Vulnerabilities (Update B)2014-12-23
Cisco
Multiple Vulnerabilities in ntpd Affecting Cisco Products2014-12-23
BSD
FreeBSD-SA-14:31.ntp: Multiple vulnerabilities in NTP suite2014-12-23
Ubuntu
NTP vulnerabilities2014-12-22

📄Research Papers

1
arXiv
Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities2020-08-17

💬Community

2
Bugzilla
CVE-2014-9296 ntp: receive() missing return on error2014-12-19
Bugzilla
CVE-2014-9296 CVE-2014-9294 CVE-2014-9295 CVE-2014-9293 ntp: various flaws [fedora-all]2014-12-19